Decentralized identity (DI) systems deliver many advancements, such as increased security, enhanced privacy, and better fault tolerance. DI architectures also provide new types of elements, including decentralized identifiers (DIDs), verifiable credentials (VCs), and...
White Papers
The Cloud: Is it Safe Enough to Store Files?
Cloud storage is amazing … and risky The 2000s may be over, but cloud storage is still amazing. Services such as Dropbox, Apple’s iCloud, Google’s Drive, and Microsoft’s OneDrive all help users share files with friends, recover when a hard drive crashes, and move...
A Platform Approach to Delivering Decentralized Identity Service Offerings
Download the PDF The Anonyome Labs platform includes a comprehensive Decentralized Identity service offering using a cloud-based, SaaS deployment model. Using this approach, Anonyome provides a complete and managed solution that includes: the deployment, management,...
Removing the Barriers to Monetizing Privacy
Download the PDF How Sudo Platform makes it easy to create new products, add privacy and online security to existing offerings, and accelerate go-to-market motions Organizations face many barriers to offering privacy products For companies that offer consumers pieces...
4 Simple Steps to Developing Privacy-First Apps with Sudo Platform
Download PDF Version Cisco’s most recent research on consumer sentiment about privacy shows 86 per cent of respondents care about data privacy and want more control, and 79 per cent are willing to vote with their wallet and not support businesses...
Multiple Personas: Enhancing Privacy in Decentralized Identity Architectures
DI architectures introduce significant security and privacy improvements, but they don’t always eliminate user-specific tracking. One way to disrupt user-specific tracking is through personas. This whitepaper describes relevant portions of DI architectures and illustrates how legal identities and personas facilitate stronger privacy control.
Realizing the Business Value of Decentralized Identity
Download PDF version Solving the problems related to identity, authentication, and information security are at the top of today’s business headlines—and this is the core purpose of decentralized identity (DI). Many whitepapers focus on DI’s technical aspects, such as...
Securing Private Communications with DIDComm
Download PDF version Building an app? Then you will likely be adding digital communications—and will need to secure them. Secure digital communications are used in everything (or should be) across all sorts of areas, such as healthcare, employment, socialization,...
Innovating Identity and Access Management with Decentralized Identity
Download PDF version Users will benefit from the transition to decentralized identity. Identity and access management, or IAM, is the security function that makes it possible for the right users to access the right resources (applications or data). IAM solutions are...